The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Although widely used in various applications, the current RFID (Radio Frequency Identification) systems lack efficiently enforcement of security and privacy. Furthermore, considering that the bearer of a RFID tag might be changed, the ownership transferring of the tags also becomes an issue. Some schemes have been suggested, but they are lack of participation of people. In this paper, we propose a...
Radio Frequency Identification (RFID) systems employ pervasive, low-cost devices to identify physical objects and track item movements. The integration of sensors into RFID tags has recently generated a lot of interest among the RFID community. Integrating automatic identification and sensors at the RFID tag hardware level not only provides an identity to an object but also provides information regarding...
The pervasiveness of RFID technology raises some issues regarding security and privacy. Untrusted RFID system poses security threat because secret information can be revealed to any adversary platform by unverified applications or components inside the RFID system itself. The unverified applications can be compromised either by any virus or man in the middle attack. In order to strengthen the system...
Power consumption is a key element in the design of secure RFID systems. It is a major resource constraint for cryptographic primitives, a sidechannel that can expose sensitive data, and a determinant of read ranges for tags. While protocol design for high-powered, networked computing devices can conveniently disregard power considerations, energy consumption is an unavoidable dimension of RFID-tag...
Most of the sources of security and privacy issues in RFID technology arise from the violation of the air interface between a tag and its reader. This paper will approach the security risk analysis process from the perspective of the RFID tag life cycle, identify the tag usage processes, identify the associated vulnerability and threat to the confidentiality, integrity and availability of the information...
This paper focuses on the challenges on the privacy of Radio Frequency Identification (RFID) systems. RFID systems have already widely applied in industry and have been bringing lots of benefits to our daily life, it also creates new security and privacy problems to individuals and organizations. The security and privacy challenges are analysed after a brief introduction of various RFID systems and...
In a true ubiquitous world, RFID tags will be available in everything, everywhere, and at all times. However, since those tags are bounded with constraints, with no foolproof method to manage the changing hands of the same-tagged item, there is no assurance of privacy and security in passive tags. Yet there are several vender specific solutions but none of them comprehensively solve the security risks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.